“…• Hybrid [Sousa et al, 2007a]: these systems combine different architectures mentioned above. [Wang and Upppalli, 2003, Chen et al, 2009, O'Brien et al, 2003 [ Stroud et al, 2004] Diversity [Wang and Upppalli, 2003, Chen et al, 2009, O'Brien et al, 2003] [Lala, 2003] FRS [Stroud et al, 2004, Zhang et al, 2005 Threshold cryptography [Ganger et al, 2001,Weinstein andLepanto, 2003] [ Lala, 2003] Recovery [Knight et al, 2001, Wang and Upppalli, 2003, Chen et al, 2009 [ Aung et al, 2005, Arsenault et al, 2007, Sousa et al, 2008, Reiser and Kapitza, 2007 Voting Upppalli, 2003, Valdes et al, 2002] [ Partha et al, 2006] Table 2.1 depicts the mapping between the attacks and the architectures. This study shows firstly that these architectures ensure tolerance to attacks for conventional distributed systems.…”